Results 61 to 70 of about 615,663 (220)

Generic Construction of Dual-Server Public Key Authenticated Encryption With Keyword Search

open access: yesIET Information Security
In this paper, we propose a generic construction of dual-server public key authenticated encryption with keyword search (DS-PAEKS) from PAEKS, public key encryption, and signatures.
Keita Emura
doaj   +1 more source

Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting

open access: yesIEEE Access, 2018
Data security and privacy concerns are important issues in cloud storage. In this paper, we propose a verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting.
Wu Daini, Qingqing Gan, Xiaoming Wang
semanticscholar   +1 more source

A Multivariate Public Key Encryption Scheme With Equality Test

open access: yesIEEE Access, 2020
The public key encryption with equality test (PKEET) allows the cloud server to judge whether two different ciphertexts are generated by the same message without decryption. Through this technique, PKEET provides an effective solution for building secure
Xiaoying Shen   +3 more
doaj   +1 more source

Quantum Random Oracle Model for Quantum Public-Key Encryption

open access: yesIEEE Access, 2019
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj   +1 more source

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

open access: yesIEEE Transactions on Information Forensics and Security, 2016
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search ...
Rongmao Chen   +4 more
semanticscholar   +1 more source

Poly-Dragon: an efficient multivariate public key cryptosystem

open access: yesJournal of Mathematical Cryptology, 2011
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our cryptosystem contains polynomials of total degree three in plaintext and ciphertext variables, two in plaintext variables and one in ciphertext variables ...
Singh Rajesh P., Saikia A., Sarma B. K.
doaj   +1 more source

Forward-Secure Public-Key Encryption Scheme Based on SM9 [PDF]

open access: yesJisuanji kexue yu tansuo
In the traditional hybrid cryptosystem, an attacker can generate the previously used session key to decrypt session contents encrypted under the session key due to the leakage of the current private key.
HUANG Wenfeng, XU Shengmin, MA Jinhua, NING Jianting, WU Wei
doaj   +1 more source

Will quantum computers be the end of public key encryption?

open access: yes, 2017
The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete ...
W. Buchanan, Alan Woodward
semanticscholar   +1 more source

New security notions and relations for public-key encryption

open access: yesJournal of Mathematical Cryptology, 2012
Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals.
Sepahi Reza   +3 more
doaj   +1 more source

A new public key cryptosystem based on IFS [PDF]

open access: yes, 2010
Most public key encryption methods suffers from the inability to prove the difficulty of the algorithms, which summarizes under the category of mathematical problems that have inverses which are believed (but not proven) to be hard.
Md. Said, Mohamad Rushdan   +1 more
core  

Home - About - Disclaimer - Privacy